Flavio Toffalini

Orcid: 0000-0002-7114-5640

According to our database1, Flavio Toffalini authored at least 24 papers between 2010 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
FISHFUZZ: Catch Deeper Bugs by Throwing Larger Nets.
Proceedings of the 32nd USENIX Security Symposium, 2023

WarpAttack: Bypassing CFI through Compiler-Introduced Double-Fetches.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

ViDeZZo: Dependency-aware Virtual Device Fuzzing.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Crystallizer: A Hybrid Path Analysis Framework to Aid in Uncovering Deserialization Vulnerabilities.
Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2023

2022
FishFuzz: Throwing Larger Nets to Catch Deeper Bugs.
CoRR, 2022

Evocatio: Conjuring Bug Capabilities from a Single PoC.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

Designing a Provenance Analysis for SGX Enclaves.
Proceedings of the Annual Computer Security Applications Conference, 2022

HolA: Holistic and Autonomous Attestation for IoT Networks.
Proceedings of the Applied Cryptography and Network Security Workshops, 2022

2021
The evidence beyond the wall: Memory forensics in SGX environments.
Digit. Investig., 2021

SnakeGX: A Sneaky Attack Against SGX Enclaves.
Proceedings of the Applied Cryptography and Network Security, 2021

2020
ASAINT: a spy App identification system based on network traffic.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020

2019
Practical static analysis of context leaks in Android applications.
Softw. Pract. Exp., 2019

Insight Into Insiders and IT: A Survey of Insider Threat Taxonomies, Analysis, Modeling, and Countermeasures.
ACM Comput. Surv., 2019

SAFE^d: Self-Attestation For Networks of Heterogeneous Embedded Devices.
CoRR, 2019

ScaRR: Scalable Runtime Remote Attestation for Complex Systems.
Proceedings of the 22nd International Symposium on Research in Attacks, 2019

Careful-Packing: A Practical and Scalable Anti-Tampering Software Protection enforced by Trusted Computing.
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019

2018
The Wolf Of SUTD (TWOS): A Dataset of Malicious Insider Threat Behavior Based on a Gamified Competition.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2018

SCARR: A Novel Scalable Runtime Remote Attestation.
CoRR, 2018

Insight into Insiders: A Survey of Insider Threat Taxonomies, Analysis, Modeling, and Countermeasures.
CoRR, 2018

Detection of Masqueraders Based on Graph Partitioning of File System Access Events.
Proceedings of the 2018 IEEE Security and Privacy Workshops, 2018

Static analysis of context leaks in android applications.
Proceedings of the 40th International Conference on Software Engineering: Software Engineering in Practice, 2018

2017
TWOS: A Dataset of Malicious Insider Threat Behavior Based on a Gamified Competition.
Proceedings of the 2017 International Workshop on Managing Insider Security Threats, Dallas, TX, USA, October 30, 2017

2016
Google Dorks: Analysis, Creation, and New Defenses.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2016

2010
REnvDB, a RESTful Database for Pervasive Environmental Wireless Sensor Networks.
Proceedings of the 30th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2010 Workshops), 2010


  Loading...